+1 to Heikki.

I think the use of AAA, in particular EAP for IoT is simply not practical,
thanks to Heikki for making this specific.
It could be theoretically beautiful though :)

Behcet

On Thu, Jul 27, 2023 at 7:08 AM Heikki Vatiainen <h...@radiatorsoftware.com>
wrote:

> On Wed, 19 Jul 2023 at 11:45, Dan Garcia Carrillo <garcia...@uniovi.es>
> wrote:
>
> On 5/7/23 15:36, Alan DeKok wrote:
>>
>
>
>> >    Given that the EAP packets can be forced to be no more than 1024
>> octets, the only difference between EAP methods is the number of packets
>> exchanged, and the total amount of data exchanged.  Current EAP supplicants
>> and authenticators limit the total number of exchanges to 50 or 100,
>> depending on various factors.
>> >
>> >    Is there a similar limit for CoAP?  i.e. will CoAP go fail if there
>> is 64K of data being exchanged in EAP?
>>
>>
>> We tried not to go there in the document, just to acknowledge that CoAP
>> fits the requirements for an EAP lower layer. In any case, EAP messages
>> larger than 1024 could be sent using CoAP Block-wise transfer, that will
>> seamlessly take care of sending payloads larger than CoAP Minimum MTU.
>>
>
> A couple of additional notes about EAP authentication exchange and its
> data use.
>
> First, if look at EAP-TTLS and PEAP but not EAP-TLS, it may seem that the
> authentication exchange is very asymmetric in how it uses data. The EAP
> server sends a long certificate chain and the client sends very little with
> many of client responses being just simple ACKs that tell the server to
> continue.
>
> EAP-TLS, especially with TLSv1.2 and earlier, uses plenty of data for both
> directions. EAP servers know how to fragment the data but clients sometimes
> may attempt to send messages that get fragmented by the lower layer and may
> get lost in transit (firewalls etc. being a problem). The problem with
> clients is typically that there may not be a setting or a method that tells
> the client to use a certain EAP message size. In other words, EAP-TLS, for
> example, supports fragmentation, but the clients especially may now know
> how small the fragment needs to be when they send out their client
> certificate and its associated CA certificate chain.
>
> Some EAP methods, such as PEAP and EAP-TTLS allow running EAP-TLS as the
> inner authentication method, which means you have TLS within TLS and client
> fragmentation becomes even more complex. Servers typically know how to
> handle this too. This is not the most common thing to do, but with TLSv1.2
> is the method to hide client certificate information when using EAP-TLS.
>
> To summarise: with EAP-TLS there is typically large amount of data
> transferred in both directions.
>
> With TLSv1.3 it's possible to omit the CA certificates:
> https://datatracker.ietf.org/doc/html/rfc8446#section-4.4.2
>
>     ... a certificate that specifies a trust anchor MAY be
>    omitted from the chain ...
>
> This can be a large size saver, but please see the whole paragraph too.
> The CA certificates (trust anchors) would need to be know be the other TLS
> endpoint if this is done. This is yet another good reason to use TLSv1.3
> even though TLSv1.2 and earlier still remain in wide use with TLS based EAP
> methods.
>
> --
> Heikki Vatiainen
> h...@radiatorsoftware.com
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace
>
_______________________________________________
Ace mailing list
Ace@ietf.org
https://www.ietf.org/mailman/listinfo/ace

Reply via email to